In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures efficiently using batch verification techniques. However, batch verification performed independently in each vehicle raises many redundant verification cost. Although, an RSU (Road Side Unit) can perform the batch verification as a proxy to reduce this cost, it additionally requires an efficient method to identify invalid signatures when the batch verification fails. In this paper, we analyze several ways of constructing a distributed batch verification system, and propose an efficient distributed batch verification system in which participating vehicles perform batch verification in a distributive manner for a small size signature set. In our ...
In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attra...
The paper addresses the problem of bad signature identification in batch verification of digital sig...
[[abstract]]In this paper, we introduce an anonymous batch authenticated and key agreement (ABAKA) s...
This paper presents an efficient approach to an existing batch verification system on Identity based...
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent ...
Vehicular ad-hoc networks (VANETs) are the crucial part of intelligent transportation systems (ITS),...
Vehicular communication networking can provide well-suited traffic messages, emergency warning messa...
Abstract Vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) communications have raised a series ...
In the near future, it is envisioned that vehicular Ad hoc networks (VANETs) will be making use of l...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authent...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In this paper, the authors have introduced three authentication methods including RSA, H...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attra...
The paper addresses the problem of bad signature identification in batch verification of digital sig...
[[abstract]]In this paper, we introduce an anonymous batch authenticated and key agreement (ABAKA) s...
This paper presents an efficient approach to an existing batch verification system on Identity based...
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent ...
Vehicular ad-hoc networks (VANETs) are the crucial part of intelligent transportation systems (ITS),...
Vehicular communication networking can provide well-suited traffic messages, emergency warning messa...
Abstract Vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) communications have raised a series ...
In the near future, it is envisioned that vehicular Ad hoc networks (VANETs) will be making use of l...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authent...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In this paper, the authors have introduced three authentication methods including RSA, H...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attra...
The paper addresses the problem of bad signature identification in batch verification of digital sig...
[[abstract]]In this paper, we introduce an anonymous batch authenticated and key agreement (ABAKA) s...